Discussions

You would be hard-pressed to find a business or organization that does not have a website or use mobile or cloud-based solutions to advertise, sell products, or offer its services. It is because the business landscape is so entrenched on the Internet that makes it so critical for security managers and analysts to stay attuned and equipped to an organization’s cybersecurity needs. 

 

Offer 2 ways that cybersecurity requirements differ from traditional enterprise security requirements. How do these requirements influence the methods used to protect data? Illustrate your response using realistic examples. 

Discussions

  • Research how to identify the IP address of your computer. After you have identified the IP address of your computer, share the URL of the resource that you found most useful in figuring out how to find your own IP address. What other details about your computer’s network connection, if any, did you learn while locating your device’s IP address?
  • 150 words
  •  
  • Discuss the security concerns inherent to wired, wireless, and mobile networking.
  • How must the different “building blocks” of data communication networks such as switches, routers, and cabling be secured?
  • 150 words

 

Discussions

  • Research intranet and internet. Then, discuss the differences between intranets and the internet in terms of purpose, architecture, topology, and protocol.  
  • What are the implications, both positive and negative, for a business that chooses to store data in the cloud (or access third-party services hosted in the cloud) vs. storing data and accessing services on its own servers? Consider cost, flexibility, customization, potential downtime, and security. 

150 words

  • Discuss the wireless spectrum and how it relates to a wireless network.
  • What frequency ranges, or bands, are associated with Wi-Fi use?
  • How does Wi-Fi transmission differ from data transmission over a physical network?
  • How might that difference affect data security over a Wi-Fi network? 

150 words

  • You are at work when network access suddenly goes down. Research and discuss how you can discover whether a router is to blame.

 

Note: You may want to start with the section “Troubleshooting Router Issues” that appears in Ch. 4, “Network Protocols and Routing,” of Network+ Guide to Networks.

150 words

  • Discuss the security concerns inherent to wired, wireless, and mobile networking.
  • How must the different “building blocks” of data communication networks such as switches, routers, and cabling be secured?

150 words

Discussions

Part 1

A company that needs help with implementing a process you have little familiarity with has contacted you. Although you could most likely learn it, you would not be a subject matter expert in the period in which they need you. You are certain you could learn the process and could use the extra income, as your consulting has been a little slow. What are the implications for deciding not to take the assignment? What are the implications for taking the assignment? What would you do and why?

Part 2

Describe your experience with a consultant, either from your place of employment (current or previous), in the community, or as the consultant yourself. Thinking of this week’s lecture and the components of a contract, did he/she follow that process? If not, what was missed? Describe your experience.

If you do not have experience with a consultant, recall a situation from your experience where you would have benefited from having an OD Consultant. What would you have done as a consultant? Why?

Part 3

Read the Forbes article: Every Leader Must be a Change Agent or Face Extinction (Links to an external site.)Links to an external site.. Given that change is interwoven in organizations today, a leader must be prepared for change in order to multiply growth opportunities. How can leaders remain ready for change and motivate their employees to embrace those changes?

Part 4

Referencing this week’s lecture, assess the changes you have made in your personal or professional life and evaluate how well you maintained the change. Do you agree with the argument that change is easier to make than maintain? Why or Why not?